back to meeting agenda.

Tuesday Extended Breakfast
Date/Time 7:30 AM to 9:45 AM
Location Overlook Ballroom East & The Terrace
Sponsors
Forward Networks
Itential
Kentik
back to meeting agenda.
Tuesday Meeting Registration
Date/Time 7:30 AM to 5:00 PM
Location Ellington Pre Function
back to meeting agenda.
Tuesday Espresso Bar
Date/Time 8:30 AM to 4:00 PM
Location Ellington Pre Function
Sponsors
QTS Data Centers
back to meeting agenda.
Members Breakfast (Invite Only)
Date/Time 9:00 AM to 9:45 AM
Location Overlook Ballroom West
back to meeting agenda.
ARIN's Internet Routing Registry (IRR) Roadmap
Date/Time 10:00 AM to 10:30 AM
Location Ellington Ballroom
Presenters
Speaker
John Curran, ARIN
John Curran is the President and CEO of ARIN. John is a recognized expert on Internet and telecommunications matters and has been the Chief Technology Officer of three successful Internet companies: BBN/GTE-Internetworking, XO Communications, and ServerVault Corporation. He has also been an active participant in the Internet Engineering Task Force (IETF), having co-chaired the IETF Operations and Network Management Area and served as a member of the IPng (IPv6) Directorate. John is a founding member of the ARIN Board of Trustees, having served since August 1997. He was re-elected in 2000, 2003, and again in October 2006, and served as Chairman of the Board of Trustees from inception through early 2009. Since 2009, John has served as ARIN's President and CEO of ARIN, which is a non-elected, full-voting member of the Board of Trustees.
Abstract ARIN recently released its preliminary IRR development roadmap for community consultation - come hear ARIN's CEO John Curran summarize the proposed direction for IRR work, open questions, and the community input process that will be used for bringing them to closure.
Presentation Files
Video Files
back to meeting agenda.
Network Operational Simplicity via Zero Touch Deployment (ZTD)
Date/Time 10:30 AM to 11:10 AM
Location Ellington Ballroom
Presenters
Speaker
Ahmed Abeer
Patrick Warichet
Abstract Zero Touch Deployment (ZTD) brings network automation and operational simplicity in the network infrastructure. It reduces operational cost by reducing human errors and tedious configuration while allowing for more dynamic and responsive operation of networks. This session will cover the ZTD architecture, use cases and its compontents.. Participants will learn existing technologies such as iPXE, ZTP, ONIE and Open APIs like NETCONF/YANG available on most of the platform platforms. Participants also learn how to use the Controller/Orchestrator and how it interacts with ZTD Components to bring network automation into the network.
Presentation Files
Video Files
back to meeting agenda.
Network Automation: Do I Need Expensive Tools To Do Meaningful Automation?
Date/Time 11:10 AM to 11:35 AM
Location Ellington Ballroom
Presenters
Speaker
Patrick Moore, Itential, LLC
Patrick has been in the Telecommunications and Information Technology fields for 20+ years. Beginning in 2000 he took on a leadership role in the implementation of networks for voice and data for a CLEC in the Southeast. Prior to that he held various technician roles for both wireless and wireline carriers maintaining networks in the field and at switch sites. Patrick transitioned to a vendor role with Alcatel-Lucent as his career progressed, managing teams of analysts, architects, and developers responsible for OSS solutions across the Americas Region. In the last few years at Itential he has been involved in the emergence of SDN and NFV by assisting clients with the evolution of their networks to the new paradigm of a programmable network, leveraging both vendor and open source solutions.
Abstract This talk will focus on: 1 - Automation Domains 2 - Use Cases for Consideration 3 - Open Source Tooling used in Network Automation Case Studies 4 - Case Studies: - Config Backup - Config Differential and Restore - MOP Automation Example: Sub Interface Configuration There are 3 primary levels of automation: Device, Service, Operational. Each of these levels builds upon the other, with each one being a prerequisite to effectively accomplishing the next. At the Device level, there are many open source tools in place that allow for high value automation work. This level can leverage templates and scripting tools highly effective automation. At the Service level, you begin to need a model-based approach to really achieve high value that is also scalable. There are aspects of the Operational level that reach into each of the lower levels. In this case, workflow and orchestration are implemented to leverage multiple templates, scripts, and/or models to achieve more sophisticated automation. In this presentation, we will focus on the Device level, as well as some simple examples of applying Operational level techniques. This discussion will revolve around configuration management use cases involved in device maintenance and MOP automation. An architecture will be covered that will be used in the cases studies to be presented. This architecture will include open source tools such as Ansible, Salt, NAPALM, and others. This should be enough detail to allow attendees to attempt similar implementations with a minimum of investment, outside of the servers the software will need to run on. We will then cover an overview of 4 common activities: config backups, config dif comparisons, restoration of a previous config, and automation of a simple MOP scenario such as a sub interface configuration activity.
Presentation Files
Video Files
back to meeting agenda.
Hackathon Runner-up
Date/Time 11:35 AM to 12:00 PM
Location Ellington Ballroom
Presenters
Moderator
Matt Ryanczak, Oracle
Presentation Files
Video Files
back to meeting agenda.
Tuesday Lunch
Date/Time 12:00 PM to 1:00 PM
Location Overlook Ballroom East & The Terrace
Sponsors
Itential
Thousand Eyes
back to meeting agenda.
Women In Technology Lunch
Date/Time 12:00 PM to 1:00 PM
Location Overlook Ballroom West
Presenters
Moderator
H. Jezzibell Gilmore, PacketFabric
Jezzibell is the SVP of Business Development for PacketFabric, a stealth mode startup building the next-generation networking platform to redefine interconnection. She brings 17+ years of professional experience from our own community. Jezzibell began her tenure in the industry at AboveNet back in 1998. She has held various positions in Management, Marketing, Operations, Global Sourcing, Corporate Strategy, and Business Development at companies such as: AboveNet, Akamai, IX Reach, ServerCentral, nLayer, and GTT.
L Sean Kennedy, Verizon
L Sean Kennedy is an active member of the Internet Engineering community and works for Verizon. He is an active member of the NANOG Board of Directors.
Speaker
Betty Burke, NANOG
Currently serving as the NANOG Executive Director, responsible for all aspects of NANOG, reporting to the Board of Directors. Previous 37 years of experience serving in technology, business, and management within the Michigan Information Technology Services, University of Michigan, and Merit Network. Proven leadership and experience in development of strategic and operational plans, creation and implementation of marketing campaign for conference center and high tech facilities including a data center, conference and office building, library and campus fiber assets. Proven operational success through project management, along with leadership through community and team building.
Ilissa Millier, iMiller Public Relations
As founder and CEO of iMiller Public Relations (iMPR), Ilissa Miller brings nearly two decades of experience in sales, marketing and product development to her clients in an effort to help them differentiate their messages and achieve notoriety within an ever expanding and evolving industry. With a wealth of experience and knowledge in the emerging global telecommunications and technology industries, her extensive expertise and practical skill set have allowed her to implement and spearhead and launch many companies as well as global product and marketing campaigns including that of international private line and networks, IP transit, peering, IPVPN, hosted PBX, cloud computing, Ethernet, managed services, colocation and data center products and solutions. She is a recognized leader in the global telecom and technology space where her knowledge and insights provide strategic guidance that enhance performance resulting in a remarkable reputation for effectiveness and client satisfaction.
back to meeting agenda.
Multicast in the EVPN World
Date/Time 1:30 PM to 2:00 PM
Location Mercer Ballroom
Presenters
Speaker
Disha Chopra, Juniper
Disha is a Product Manager at Juniper Networks driving Layer 2 software technologies for all networking domains. She has a special focus on EVPN and has several public presentations on the subject to her credit.
Abstract This talk/tutorial will be about Multicast in the EVPN World. This is a developing area and lot of innovations are happening in IETF in terms of adding new route types and defining new procedures to handle multicast efficiently. This topic applies to both, Data Center as well as Service Provider Edge domains. With Data Center Fabric the typical data plane used is VXLAN whereas with Service Providers we are looking at MPLS. Since the control plane (EVPN), is the same for both the encapsulations it will be easy to highlight efficiencies of this developing technology in multiple domains. Data Centers and Service Providers are where active deployment is happening with this technology, we will also be covering how this feature can be used in Metro and Telco Cloud environments. The talk/tutorial will be divided into two parts; the first part will provide an introduction to the technical aspects of EVPN Route Types 7,8 & 6, these map to IGMP Join, Leave and Selective Tunnels respectively. The second part will shift focus to the Data Center and the efficiencies this technology will bring to the domains.
Presentation Files
Video Files
back to meeting agenda.
Death to Whois
Date/Time 2:00 PM to 2:30 PM
Location Mercer Ballroom
Presenters
Speaker
Matt Griswold, United IX, 20C
Matt Griswold is co-founder of United IX, an Internet exchange in Chicago. He has been instrumental in launching several technology companies since 1999, playing key roles in development, networking and system administration. Mr. Griswold is passionate about coding and peering and has volunteered for Euro-IX, NANOG, Open-IX and PeeringDB.
Abstract # Death to Whois An exploratory look at RDAP ## Introduction While writing code for PeeringDB, I did extensive work querying and comparing RDAP results across the RIRs and was surprised by the inconsistencies. It's a great tool to replace whois, but it still needs work and communication to come to fruition -- luckily the RIRs have all been very receptive to complaints and are quick to fix bugs. ## Problems with whois - normalization - inability to automate around it ## Great features of rwhois - recursive - how that adapt to HTTP redirects and REST fit perfectly ## RDAP - intro - IP/ASN/DNS/etc - compare results from all 5 RIRs - RIRs are very responsive to fixing ## Replacing whois completely with RESTful services - what is required - what we have now - minimal gap to make this actually work ## PeeringDB client - example of how a client can function as whois, only with authenticated data - same code / output as PDB whois server - authenticated gives added data - ability to bring results directly into code / automation ## Going Forward - GROW discussion - new tool chain
Presentation Files
Video Files
back to meeting agenda.
Protocol Evolution and its Impact on Network Operators
Date/Time 2:30 PM to 3:00 PM
Location Mercer Ballroom
Presenters
Speaker
Ian Swett, Google
Software developer working on the QUIC internet transport being developed by Google. I focus on issues related to YouTube, including video quality of experience, and deployment.
Abstract An overview of HTTP/2, TLS 1.3, QUIC, and DoH, and how these new standards to make the internet faster, more private, and more secure may impact network operators.
Presentation Files
Video Files
back to meeting agenda.
KRACK Simplified
Date/Time 3:00 PM to 3:30 PM
Location Mercer Ballroom
Presenters
Speaker
Sundar Sankaran, Ruckus Networks, an Arris Company
Sundar Sankaran is a VP of Engineering at Ruckus Networks, an Arris Company, where he leads the Access Point HW and SW teams. He is a wireless industry veteran with extensive experience building various wireless systems. Sundar joined Ruckus from Atheros/Qualcomm, where he was a Senior Director of Technology and served as the overall engineering lead, with the responsibility to deliver silicon along with reference hardware and software, on multiple WiFi chip programs. Prior to Qualcomm Atheros, he has had stints at Intel, ArrayComm, and Infosys. He is a co-inventor on 18 US patents as well as several pending patents. Sundar earned a Bachelor’s degree in Electronics and Communication Engineering from Anna University, and Master’s and PhD degrees in Electrical Engineering from Virginia Tech.
Abstract WiFi devices have been using a security protocol called WPA2 without any known issues for over a decade. But in October 2017, two security researchers from University of Leuven in Belgium published a paper describing a vulnerability with this protocol. This vulnerability gets exposed during the Key Reinstallation. Hence, this is called Key Reinstallation Attack or KRACK for short. This talk provides a simplified overview of the client and access-point loopholes that are exploited by KRACK as well as the countermeasures to address these loopholes, and concludes with a realistic assessment of exposure to this attack.
Presentation Files
Video Files
back to meeting agenda.
Tuesday Break
Date/Time 3:30 PM to 4:00 PM
Location Ellington Pre Function
Sponsors
Ekinops
KDDI
back to meeting agenda.
Lightning Talk: Inferring BGP Blackholing Activity in the Internet
Date/Time 4:00 PM to 4:10 PM
Location Mercer Ballroom
Presenters
Speaker
Arnold Nipper
Abstract The Border Gateway Protocol (BGP) has been used for decades as the de facto protocol to exchange reachability information among networks in the Internet. However, little is known about how this protocol is used to restrict reach- ability to selected destinations, e.g., that are under attack. While such a feature, BGP blackholing, is available since 1996 a systematic study on its Internet-wide adoption, practices, network efficacy, and the profile of blackholed destinations is lacking. In this talk, we present the inferred BGP blackholing activity in the wild. Hundreds of networks, including large access providers, as well as about 40 IXPs offer blackholing service to their customers and peers. Over the last three years the number of blackholed prefixes has increased by more than 800%, with a daily average of about 4K prefixes initiated by more than 600 ASes in recent months. Our insights are relevant for operators that consider offering BGP blackholing services as well as to regulators and researchers regarding which destinations are blackholed in the Internet.
Presentation Files
Video Files
back to meeting agenda.
Lightning Talk Proposal: A New Twist In SSDP DDoS Attacks
Date/Time 4:10 PM to 4:20 PM
Location Mercer Ballroom
Presenters
Speaker
Matt Bing
Abstract Network operators are familiar with defending against reflection / amplification DDoS attacks. Arbor Networks has uncovered a new twist that abuses SSDP to bypass naive port filtering, raising the bar for defenders. Evidence shows attackers are aware of this behavior and have this technique waiting in their tool chest. Digging into the root cause show a surprising number of CPE devices are rife for abuse. This talk will show the specifics of this attack, how we determined the cause, and the challenges it brings to protecting networks.
Presentation Files
Video Files
back to meeting agenda.
Using ARIN WHOIS data in BGP prefix filters
Date/Time 4:20 PM to 4:30 PM
Location Mercer Ballroom
Presenters
Speaker
Job Snijders, NTT Communications
Job is actively involved in the Internet community both in an operational capacity and as a founder of cooperation efforts such as the NLNOG RING. He has taught service providers in the Middle East how to deploy IPv6 and has a passion for Routing Security and Automation. Job holds a position at NTT Communications' IP Development Department.
Abstract I'd like to share a brief update on some routing security activities that ARIN, NTT, YYCIX, NLNOG, and the arouteserver project have been collaborating on. We worked to produce a new, automatable, source for authoritative routing data: ARIN WHOIS. There is a lot of valuable routing information in the ARIN WHOIS registry. I'll cover how the data is used and suggest future improvements.
Presentation Files
Video Files
back to meeting agenda.
Bit Index Explicit Replication - A stateless Multicast Architecture
Date/Time 4:30 PM to 5:00 PM
Location Mercer Ballroom
Presenters
Speaker
Nagendra Kumar Nainar, Cisco
Abstract In this session, we present Bit Index Explicit Replication (BIER), a new stateless multicast architecture that provides optimal multicast forwarding by imposing the receiver information in the packet header itself. This not only follows the unicast path but also eliminates the need for explicit multicast tree building protocol or to maintain per-flow state entries in the network domain. This session introduces the BIER architecture, covers various main use cases and describes the related ongoing standardization efforts.
Presentation Files
Video Files
back to meeting agenda.
Operators and the IETF
Date/Time 5:00 PM to 5:30 PM
Location Mercer Ballroom
Presenters
Moderator
Warren Kumari, Google
Warren Kumari currently works for Google in the Internet Evangelism group, and has been with the company since 2005. He has over 20 years of experience in the Internet industry, ranging from tiny start-up ISPs to large enterprises. Prior to serving as IETF Operations and Management Area director Warren chaired the OpSec, OpsAWG, DPRIVE, DANE and CAPPORT working groups. Warren is also active in ICANN, serving on the Security and Stability Advisory Committee (SSAC), and is a consultant to USC/ISI (the operator of B-Root).
Speaker
Benoit Claise, Cisco Systems
Benoit Claise is a Cisco Distinguished Engineer at Cisco Systems, working as an architect for embedded management and device instrumentation. Area of passion & expertise includes Internet traffic monitoring, accounting, performance, fault, configuration, and energy management. For almost 6 years now, Claise was selected as a member of the Internet Engineering Steering Group (IESG) at the IETF, as IETF Operations and Management area director. Claise's area of focus these days, both at the IETF and at Cisco, is YANG as THE data modeling language and NETCONF. As a contributor to the IETF, with more than 35 RFCs and drafts in the area of traffic monitoring and performance: NetFlow Version 9, IPFIX (IP Flow Information eXport), PSAMP (Packet Sampling), IPPM (IP Performance Metrics), and Energy Management (EMAN) and data modeling-driven management (YANG). Claise is the author of the ciscopress book "Network Management: Accounting and Performance Strategies".
Spencer Dawkins
Lee Howard, Retevia
Alvaro Retana
Jeff Tantsura, Nuage Newark
Jeff Tantsura has been in the networking space for 20+ years and has authored/contributed to many RFC’s and patents. He is the chair of IETF Routing Working Group, chartered to work on new Network Architectures and Technologies, including Fast Convergence, protocol independent YANG models and Next Gen Data Center Routing Protocols. His work has mostly been focused on: BGP, IGP’s, PCE, Segment Routing and data modeling. Jeff also serves on the Internet Architecture Board (IAB). His focus has been: 5G, low latency, IoT, MEC and Next Gen DC Networking. Work in IETF: http://www.arkko.com/tools/allstats/jefftantsura.html LinkedIn: https://www.linkedin.com/in/jeff-tantsura-bb229b2
Abstract This is a panel of IETF Area Directors (Benoit (Management), Spencer (Transport), Alvaro (Routing), Warren (Operations)) and IAB members (Lee Howard, Jeff Tantsura). We would each present a 4-5 minute update/teaser on the focus of each Area and things relevant to operators in our areas; and some info on how interested people can participate. IETF members will be in the Terrace open seating area during breaks to answer any questions. Come find us if you have additional questions. In 2015 Chris Grundermann (ISOC) ran a survey and shared it at NANOG63 (results at: https://www.nanog.org/sites/default/files/monday_general_grundemann_IETF_63.5.pdf ) - if someone wants some background information.
Presentation Files
Video Files
back to meeting agenda.
Beer n Gear
Date/Time 6:00 PM to 8:00 PM
Location Ellington Ballroom
Sponsors
Adva Optical Networking
Arbor Networks
China Telecom
Ciena
Cisco
Corero
Coriant
DE-CIX
EdgeConneX
Extreme Networks
Fujitsu
H5 Data Centers
Hilco Streambank
Juniper Networks
Packet Design
Precision Optical Transceivers
Smartoptics
Telia Carrier
VIAVI Solutions
Windstream
back to meeting agenda.
Tuesday Evening Social Event
Date/Time 8:00 PM to 11:00 PM
Location Park Tavern
Sponsors
Total Server Solutions
back to meeting agenda.